Asset inventory of over 800 public bug bounty programs.
-
Updated
Jul 9, 2024 - Shell
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Asset inventory of over 800 public bug bounty programs.
Security automation content in SCAP, Bash, Ansible, and other formats
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
EMBA - The firmware security analyzer
⚡️ Docker official image for Wallarm Node. API security platform agent.
Script desenvolvido para análise de logins mal-sucedidos em serviços.
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
A collection of android security related resources. With repository stars⭐ and forks🍴
Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too.
A script for managing secrets encrypted / decrypted via AWS KMS.
My Privacy DNS #Matrix lists for blacklisting
Hardening Ubuntu. Systemd edition.
👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetration testing and offensive cybersecurity.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
The Official Hak5 Shark Jack Payload Repository
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
Useful tips for various types of cybersecurity challenges
A few utilities to work with JWTs.
Oct 29 - 30, 2024 • San Francisco, CA